Professional Documents
Culture Documents
Andrew Bennett, Colin Elman & John M. Owen-Security Studies Security Studies and Recent Developments in Qualitative and Multi Method Research
Andrew Bennett, Colin Elman & John M. Owen-Security Studies Security Studies and Recent Developments in Qualitative and Multi Method Research
Andrew Bennett, Colin Elman & John M. Owen-Security Studies Security Studies and Recent Developments in Qualitative and Multi Method Research
To cite this article: Andrew Bennett, Colin Elman & John M. Owen (2014) Security Studies,
Security Studies, and Recent Developments in Qualitative and Multi-Method Research, Security
Studies, 23:4, 657-662, DOI: 10.1080/09636412.2014.970832
657
658 A. Bennett, C. Elman, and J. Owen
1 The three most cited works were Alexander L. George and Andrew Bennett, Case Studies and
Theory Development in the Social Sciences (Cambridge, MA: MIT Press, 2005); Gary King, Robert Keohane,
and Sidney Verba, Designing Social Inquiry: Scientific Inference in Qualitative Research (Princeton, NJ:
Princeton University Press, 1994); Harry Eckstein, “Case Studies in Political Science,” in Handbook of
Political Science, Vol. 1, Political Science: Scope and Theory, ed. Fred Greenstein and Nelson W. Polsby
(Reading, MA: Addison-Wesley, 1975), 79–138. Among the thirty articles making evidence-based claims
and the subset using small-n and within-case methods, the median number of methodological books and
articles cited was 2.5. The modal number of methods citations for both sets was one. We are grateful to
Giles David Arceneaux for his research assistance in providing these data.
Forum on Transparency: Introduction 659
The first Miller Center workshop session, and the first forum in the series,
focuses on research transparency, and in particular on achieving openness in
qualitative scholarship. In some respects this is a natural place to begin a con-
versation about methods. Transparency is best considered a meta-standard:
all rule-based social inquiry is based on shared and stable beliefs that re-
search designed and conducted in particular ways—according to particular
rules—is warranted to produce knowledge with certain characteristics. Only
research that is designed and conducted in accordance with those rules can
generate knowledge of that type. Openness empowers authors to demon-
strate that inquiry is rigorous work of a certain type and hence can claim its
virtues.3 Transparency is widely considered a fundamental element of social
science, and the discipline of political science has been at the forefront in
the development of new practices.4
2 All papers submitted for publication were put through standard double-blind peer review and were
Tradition,” PS: Political Science & Politics 47, no. 1 (January 2014): 43–47.
4 Arthur Lupia and Colin Elman, “Openness in Political Science: Data Access and Research Trans-
parency,” PS: Political Science & Politics 47, no. 1 (January 2014): 19–42.
5 See Andrew Moravcsik, “Active Citation: A Precondition for Replicable Qualitative Research,” PS:
Political Science & Politics 43, no. 1 (January 2010): 29–35; Moravcsik, “Active Citation and Qualitative
Political Science,” Qualitative & Multi-Method Research 10, no. 1 (Spring 2012): 33–37; Moravcsik, “Trans-
parency: The Revolution in Qualitative Political Science,” PS: Political Science & Politics 47, no. 1 (January
2014): 48–53.
660 A. Bennett, C. Elman, and J. Owen
6Moravcsik, “Active Citation”; Moravcsik, “Active Citation and Qualitative Political Science.”
7For more information on how to create a TRAX, see A Guide to Active Citation, available at
https://qdr.syr.edu/guidance.
Forum on Transparency: Introduction 661
CONCLUSION
We are grateful to Security Studies for hosting these Forums and to the
authors for their participation and contributions. With respect to this Forum
on transparency, we want to close with three points.
First, we agree that active citation appears to be a promising way to
present research, at least for designs that use within-case analyses and small-
n comparisons. It is likely to be one of the ways in which qualitative re-
searchers render their work more open. The technique is still in develop-
ment, however, and as the contributors to this Forum show, there are several
questions that have yet to be settled. Indeed, we suspect that even when the
technique is more advanced, there may not be one “right way” to activate.
Scholars may instead have to make choices among alternatives (for example,
whether to annotate or not) with known trade-offs.
Second, active citation is only one among a family of cognate techniques
that provide transparency in different research contexts. Not all of these prac-
tices will apply equally everywhere. Pre-registration of research designs, for
example, will have a much better fit with laboratory experiments than ob-
servational field studies. A risk that bears mentioning is that even though the
many methodologists working to develop transparency tools and techniques
are doing so in a somewhat coordinated manner, they may still be tempted
to redefine transparency terms of art to provide the closest possible fit with
their own research context. We think the sociological and methodological
payoffs from a coherent and unified disciplinary conversation outweigh any
possible advantages that might arise from location-specific redefinition, and
we hope scholars will resist that temptation.8
8 Terms and definitions designed to fit multiple research contexts and techniques have already been
established for our discipline. The American Political Science Association’s Guide to Professional Ethics
662 A. Bennett, C. Elman, and J. Owen
in Political Science (2012) states that “researchers have an ethical obligation to facilitate the evaluation
of their evidence-based knowledge claims through data access, production transparency, and analytic
transparency so that their work can be tested or replicated.” The three constitutive terms are defined as
follows:
6.1 Data access: Researchers making evidence-based knowledge claims should reference
the data they used to make those claims. If these are data they themselves generated or
collected, researchers should provide access to those data or explain why they cannot. 6.2
Production transparency: Researchers providing access to data they themselves generated
or collected should offer a full account of the procedures used to collect or generate the
data. 6.3 Analytic Transparency: Researchers making evidence-based knowledge claims
should provide a full account of how they draw their analytic conclusions from the data,
i.e., clearly explicate the links connecting data to conclusions.
9 John Lewis Gaddis, “In Defense of Particular Generalization: Rewriting Cold War History, Rethinking
International Relations Theory,” in Bridges and Boundaries: Historians, Political Scientists, and the Study
of International Relations, ed. Colin Elman and Miriam Fendius Elman (Cambridge, MA: MIT Press, 2001),
301.